The SCEAS System
Navigation Menu

Conferences in DBLP

Foundations of Software Engineering (SIGSOFT FSE) (sigsoft)
2003 (conf/sigsoft/2003)

  1. Giuseppe Longo
    Computer modelling and natural phenomena. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:1-5 [Conf]
  2. Leon J. Osterweil
    Understanding process and the quest for deeper questions in software engineering research. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:6-14 [Conf]
  3. Ari Jaaksi
    Assessing software projects: tools for business owners. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:15-18 [Conf]
  4. Sebastián Uchitel, Jeff Kramer, Jeff Magee
    Behaviour model elaboration using partial labelled transition systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:19-27 [Conf]
  5. Ralph D. Jeffords, Constance L. Heitmeyer
    A strategy for efficiently verifying requirements. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:28-37 [Conf]
  6. Holger Giese, Matthias Tichy, Sven Burmester, Stephan Flake
    Towards the compositional verification of real-time UML designs. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:38-47 [Conf]
  7. Don S. Batory, Jia Liu, Jacob Neal Sarvela
    Refinements and multi-dimensional separation of concerns. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:48-57 [Conf]
  8. Petri Selonen, Jianli Xu
    Validating UML models against architectural profiles. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:58-67 [Conf]
  9. Luciano Baresi, Reiko Heckel, Sebastian Thöne, Dániel Varró
    Modeling and validation of service-oriented architectures: application vs. style. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:68-77 [Conf]
  10. Jeremy S. Bradbury, Jürgen Dingel
    Evaluating and improving the automatic analysis of implicit invocation systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:78-87 [Conf]
  11. Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer
    Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:88-97 [Conf]
  12. Gregory M. Kapfhammer, Mary Lou Soffa
    A family of test adequacy criteria for database-driven applications. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:98-107 [Conf]
  13. Nguyen Tran Sy, Yves Deville
    Consistency techniques for interprocedural test data generation. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:108-117 [Conf]
  14. Atif M. Memon, Mary Lou Soffa
    Regression testing of GUIs. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:118-127 [Conf]
  15. Alessandro Orso, Taweesup Apiwattanapong, Mary Jean Harrold
    Leveraging field data for impact analysis and regression testing. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:128-137 [Conf]
  16. James D. Herbsleb, Audris Mockus
    Formulation and preliminary test of an empirical theory of coordination in software engineering. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:138-137 [Conf]
  17. Tore Dybå
    Factors of software process improvement success in small and large organizations: an empirical study in the scandinavian context. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:148-157 [Conf]
  18. João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur
    Monitoring the software test process using statistical process control: a logarithmic approach. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:158-167 [Conf]
  19. Matthias M. Müller, Frank Padberg
    On the economic evaluation of XP projects. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:168-177 [Conf]
  20. Jens Krinke
    Context-sensitive slicing of concurrent programs. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:178-187 [Conf]
  21. Oksana Tkachuk, Matthew B. Dwyer
    Adapting side effects analysis for modular program model checking. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:188-197 [Conf]
  22. Dennis Brylow, Jens Palsberg
    Deadline analysis of interrupt-driven software. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:198-207 [Conf]
  23. Claus Pahl, Michael Casey
    Ontology support for web service processes. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:208-216 [Conf]
  24. Jukka Viljamaa
    Reverse engineering framework reuse interfaces. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:217-226 [Conf]
  25. Dirk Ohst, Michael Welle, Udo Kelter
    Differences between versions of UML diagrams. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:227-236 [Conf]
  26. Stan Jarzabek, Shubiao Li
    Eliminating redundancies with a "composition with adaptation" meta-programming technique. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:237-246 [Conf]
  27. Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia-Yi Pan
    Towards scalable compositional analysis by refactoring design models. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:247-256 [Conf]
  28. Dimitra Giannakopoulou, Jeff Magee
    Fluent model checking for event-based systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:257-266 [Conf]
  29. Robby, Matthew B. Dwyer, John Hatcliff
    Bogor: an extensible and highly-modular software model checking framework. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:267-276 [Conf]
  30. Fei Xie, James C. Browne
    Verified systems by composition from verified components. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:277-286 [Conf]
  31. Stephen McCamant, Michael D. Ernst
    Predicting problems caused by component upgrades. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:287-296 [Conf]
  32. Hridesh Rajan, Kevin J. Sullivan
    Eos: instance-level aspects for integrated system design. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:291-306 [Conf]
  33. Suan Hsi Yong, Susan Horwitz
    Protecting C programs from attacks via invalid pointer dereferences. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:307-316 [Conf]
  34. V. Benjamin Livshits, Monica S. Lam
    Tracking pointers with path and context sensitivity for bug detection in C programs. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:317-326 [Conf]
  35. Yichen Xie, Andy Chou, Dawson R. Engler
    ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:327-336 [Conf]
  36. Koushik Sen, Grigore Rosu, Gul Agha
    Runtime safety analysis of multithreaded programs. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:337-346 [Conf]
  37. Nikunj R. Mehta, Nenad Medvidovic
    Composing architectural styles from architectural primitives. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:347-350 [Conf]
  38. Kleanthis Thramboulidis
    Towards an engineering tool for implementing reusable distributed control systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:351-354 [Conf]
  39. Antonia Bertolino, Stefania Gnesi
    Use case-based testing of product lines. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:355-358 [Conf]
  40. Rik Eshuis, Pierre Brimont, Eric Dubois, Bertrand Grégoire, Sophie Ramel
    EFFICIENT: a tool set for supporting the modelling and validation of ebXML. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:359-362 [Conf]
  41. Simonetta Balsamo, Moreno Marzolla
    A simulation-based approach to software performance modeling. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:363-366 [Conf]
  42. Alexander Ran, Raimondas Lencevicius
    Making sense of runtime architecture for mobile phone software. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:367-370 [Conf]
  43. Eunyoung Lee, Andrew W. Appel
    Policy-enforced linking of untrusted components. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:371-374 [Conf]
  44. Paulo Asterio de Castro Guerra, Cecília M. F. Rubira, Alexander B. Romanovsky, Rogério de Lemos
    A fault-tolerant software architecture for COTS-based software systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:375-378 [Conf]
  45. Richard S. Hall, Humberto Cervantes
    Gravity: supporting dynamically available services in client-side applications. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:379-382 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002